|
||||||
|
||
|
Home > Copy protected software |
Related keywords: copy, dvd copy, Copy, copy dvd, copy protection, password protected, Copy Protection, DVD copy, COPY, file copy |
|
|
41. | HTML Guard 2.32 (aw-soft.com) | ||
you want to prevent unauthorized copies of parts of your Internet sites you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
42. | HUSB Virtual Driver (HUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Fernando Chavez | Size: 547 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
43. | ICE License 2.01 (aidsoft.com) | ||
License Protection is providing a high barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open channel without a common secret key previously shared between the ends.ICE License Features : * Antidebugging & Antimonitors Protection | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
44. | Laurel USB Virtual Driver 2.0 (itlaurel.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 3, 2005 | Rating: 0 | Author: Janice Petros | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
45. | Licence Protector 2.4 (mirage-systems.de) | ||
have developed an application and you want to protect it fast, easy, reliable and cost effective? Licence Protector from Mirage Computer Systems administrates licences and modules (license manager and control), generates Demo- and time limited versions (trial versions), provides you with software copy protection and supports concurrent user (floating license) testing | |||
Updated: 2, 2006 | Rating: 0 | Author: Mirage Sales | Size: 14806 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
46. | NewAge USB Virtual Driver 2.0 (newageit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 3, 2005 | Rating: 16 | Author: Matthew Jacobson | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
47. | PC Guard for Win32 5.00 (sofpro.com) | ||
and licensing system. With PC Guard for Win32 you can easily protect Windows 95/98/ME/2000/NT/XP 32bit EXE/DLL applications from illegal distribution and reverse engineering. Even more, you don't need any source code editing or programming experience for this. Everything is fully automatic! With PC Guard for Win32 you can protect unlimited number of your | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
48. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration software, you can use as protection against reverse-engineering or you can use as additionnal protection with you current | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
49. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
For Shareware developers who want to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is called by your software and is displayed to | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
50. | ShareGuard V1 1 (zappersoftware.com) | ||
For Shareware developers who want to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is called by your software and is displayed | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Copy protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|